Terminology

Cybersecurity terms, explained clearly for all experience levels

The cybersecurity world is full of acronyms, jargon, and terms that evolve as fast as the threats themselves. This glossary cuts through the complexity, offering plain-language explanations for both foundational and advanced security terms.
Whether you’re reading a compliance report, building a risk strategy, or trying to explain a term to your board or development team-this is your go-to reference.

It’s built for clarity, accuracy, and utility-because clear understanding is the first layer of defense.

Please note: All materials are subject to our Terms of Use

Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Intrusion Detection and Prevention Systems (IDPS)
Intrusion Detection and Prevention Systems (IDPS) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Firewall
Firewall explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
External Attack Surface Management (EASM)
External Attack Surface Management (EASM) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Extended Detection and Response (XDR)
Extended Detection and Response (XDR) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Email Security Gateway (ESG)
Email Security Gateway (ESG) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Data Loss Prevention (DLP)
Data Loss Prevention (DLP) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.
Cyber Asset Attack Surface Management (CAASM)
Cyber Asset Attack Surface Management (CAASM) explained for cybersecurity leaders and practitioners. Learn what it means and how it supports clearer security decisions.

Experiencing a Breach? Act Now!

If your organization is experiencing an active cyber attack, breach, or security incident, use this SOS channel to reach us immediately. Our rapid response team is on standby to help you contain, assess, and mitigate the threat.

This page is reserved for urgent, ongoing incidents only.
If you are not currently under attack but would like to discuss our services or have a general inquiry, please visit our Contact Us page.

When every second counts, don’t wait – send us an SOS now.

    By clicking "Help Me!" I agree to the use of my personal data in accordance with Cygeta Privacy Policy and Terms of Use. This site is protected by Cloudflare Turnstile and by Google reCAPTCHA. Google Privacy Policy and Terms of Service and CloudFlare Privacy Policy apply.